메뉴 건너뛰기




Volumn , Issue , 2012, Pages 37-45

Efficient and secure data storage operations for mobile cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISM; CLOUD SERVICES; COMPUTING SYSTEM; DATA ACCESS CONTROL; DATA CONTENTS; DATA STORAGE; ENCRYPTION AND DECRYPTION; GROUP-BASED; LIGHT WEIGHT; OUTSOURCE; PERFORMANCE ASSESSMENT; PRIVACY PRESERVING; RESEARCH DIRECTIONS; SECURE DATA; SECURE DATA STORAGE; SECURITY STRENGTHS; SENSING DATA; SENSING DEVICES; WIRELESS COMMUNICATION DEVICES;

EID: 84872074603     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (181)

References (35)
  • 2
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology-EUROCRYPT 2005, pages 440-456, 2005.
    • (2005) Advances in Cryptology-EUROCRYPT 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.J.3
  • 5
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Springer
    • D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO 2005, pages 258-275. Springer, 2005.
    • (2005) Advances in Cryptology-CRYPTO 2005 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 10
    • 38149121099 scopus 로고    scopus 로고
    • Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
    • C. Delerablée, P. Paillier, and D. Pointcheval. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. Pairing-Based Cryptography-Pairing 2007, pages 39-59.
    • Pairing-Based Cryptography-Pairing 2007 , pp. 39-59
    • Delerablee, C.1    Paillier, P.2    Pointcheval, D.3
  • 13
    • 84979291225 scopus 로고
    • Broadcast Encryption, Advances in Cryptology-Crypto93
    • A. Fiat and M. Naor. Broadcast Encryption, Advances in Cryptology-Crypto93. Lecture Notes in Computer Science, 773:480-491, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 15
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • C. Gentry. Computing arbitrary functions of encrypted data. Communications of the ACM, 53(3):97-105, 2010.
    • (2010) Communications of the ACM , vol.53 , Issue.3 , pp. 97-105
    • Gentry, C.1
  • 24
    • 33845331515 scopus 로고
    • Minimization of Boolean functions
    • E.J. McCluskey. Minimization of Boolean functions. Bell System Technical Journal, 35(5):1417-1444, 1956.
    • (1956) Bell System Technical Journal , vol.35 , Issue.5 , pp. 1417-1444
    • McCluskey, E.J.1
  • 29
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • IEEE
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-9. IEEE, 2010.
    • (2010) INFOCOM, 2010 Proceedings IEEE , pp. 1-9
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 35
    • 74049138993 scopus 로고    scopus 로고
    • On protecting integrity and confidentiality of cryptographic file system for outsourced storage
    • ACM
    • A. Yun, C. Shi, and Y. Kim. On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 67-76. ACM, 2009.
    • (2009) Proceedings of the 2009 ACM Workshop on Cloud Computing Security , pp. 67-76
    • Yun, A.1    Shi, C.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.